Section A - Standards that Apply to All RFPs
|
|
- Hillary Bates
- 5 years ago
- Views:
Transcription
1 These standards provide general information regarding the services provided by the Information Technology branch, in the context of implementation projects. These standards are published, at minimum, bi-annually through consultation with subject matter experts. Respondents who have questions regarding these standards should engage the contact identified on the RFP they are responding to. Section A - Standards that Apply to All RFPs These standards apply, regardless of where the Solution may be hosted. 1. Project Management Methodology Project Lifecycle / Gating Process The Information Technology Branch uses a customized project management methodology which aligns with PMI standards. The Information Technology Branch utilizes the standard PMBOK Process Groups for the formal deliverables. These groups are: Initiating, Planning, Executing, Monitor & Controlling, and Closing. Mandatory deliverables are defined via a published Responsibility Matrix.. Implementation of any information technology to City of Edmonton staff normally must utilize this methodology for the IT-specific components of the Project, even if the primary purpose of your Project is not Information Technology. For all implementations, weekly status reports and monthly project logs must be submitted to the PMO utilizing in-house standard templates. Disaster Recovery Planning FOIP All projects must include a Disaster Recovery plan specific to the requirements of the business. This applies whether the solution is to be hosted by the City of Edmonton or by a third-party. All projects must include a Pre-PIE (Preliminary Privacy Impact Evaluation) and potentially a PIE (Privacy Impact Evaluation) which is approved by the Corporate FOIP office in the Office of the City Clerk. 2. Security & Risk Assurance General Solutions must use industry-standard (or better) security procedures and technologies. The level of security controls must be adequate given the risks and information managed by the application, and must be compatible with existing City of Edmonton security infrastructure. Installation, support, development and enhancements of solutions should be performed on-site. If this is not possible, then remote access will be provided by the City of Edmonton using one of our existing remote access solutions. Infrastructure All City-managed computers (server, desktop, laptop) require a Last Update: March 2, 2017 Page 1 of 9
2 working, properly configured anti-virus software that meets the City s standard anti-virus offerings. Solutions deployed to personal computing devices should not require Local Administrator to operate. Local connections to the City of Edmonton network must be done with City-managed devices. Direct connection of devices not managed by the Information Technology Branch to the City of Edmonton internal corporate network is not permitted. Remote access to the City of Edmonton network is limited to use of City of Edmonton approved and managed access solutions. Use of remote access includes granting the City of Edmonton permission to validate the security of the device being used to connect, including (but not limited to) anti-virus and operating system patch levels. Access is sometimes limited to City-managed devices, based on the access level that is necessary. Access sometimes requires the use of two-factor authentication. Internal Solutions The use of non-standard ports will require explicit City of Edmonton approval, including the use of compensatory packages to strengthen the level of security. Information stored locally on mobile computing devices must be protected by an appropriate data security solution, as determined by the City of Edmonton. Encryption of stored data requires City of Edmonton approval and must include key escrow procedures to ensure encryption keys are available when staff are absent. External Solutions Any secure internet site which the City of Edmonton is required to use as part of a solution must be signed with a valid and trusted SSL certificate. Self-signed SSL certificates are not accepted by the City of Edmonton as either valid or trusted. Any communication over a publicly accessible network that involves the transmission of City of Edmonton information must be adequately encrypted. Adequacy is subject to City of Edmonton approval. 3. Enterprise Solutions ERP Applications PeopleSoft HR POSSE SAP SAP Business Objects Spatial Land Inventory Management (SLIM) System Spatial Data & Rendering GeoMedia suite Oracle RDBMS with Oracle Spatial and Oracle Workspace Manager Drafting Bentley Microstation Last Update: March 2, 2017 Page 2 of 9
3 Bentley Maps 4. Desktop Software The applications detailed here are available on all standard desktop installations at the City of Edmonton. Standard operating system for desktops is Microsoft Windows bit. Productivity Software G Suite (Standard Mail and Calendar) G Suite (collaboration and productivity) Google Hangout Adobe Reader Adobe Flash Player Adobe Shockwave RightFax Note: Additional Microsoft Office Professional 2010 applications are available as complimentary productivity tools providing the appropriate business requirements Web Browsers Google Chrome Internet Explorer Ver 11 (exceptions available for alternative IE Versions) Anti-Virus Anti-Virus services are provided to all desktop and laptop installations. Software Fax Software-based FAX service is available on all desktop installations. 5. & Calendar & Calendar Video Streaming Google and Google Calendar are the primary and calendar service offerings. Exchange services are available for application integration use. Archival services are provided to all services. Filtering of , for spam and security purposes, is actively performed. Video streaming is provided through internally hosted streaming services and through web-hosted streaming services. The standard for streamed video format is H.264 MPEG Development Tools These standards only apply to solutions that the City of Edmonton will be directly supporting in a fashion that requires changes to implementation code. Application.NET C++ Java Last Update: March 2, 2017 Page 3 of 9
4 PERL Database Business Objects Enterprise XI Oracle Discoverer Oracle Enterprise Manager Oracle Forms Oracle JDeveloper Oracle Reports SQL Navigator SQL Plus SQL Developer TOAD Version Control Team Foundation Server/Team Foundation Services Web Development.NET Technology SAP NetWeaver Developer Studio 7. Open Source The following standards only apply to Open-Source respondents to RFPs. Product Roadmap The City of Edmonton encourages vendors to submit roadmaps for open source products as part of an RFP response to ensure we have an understanding of how the product s features will be changing over the near future. Product Support RFP responses that are suggesting the use of an open source product must contain elements that detail how adequate support for this product will be provided. Adequacy is determined by the City of Edmonton. 8. Web Application The following standards only apply to web applications or websites. Mobile Friendly Avoids software that is not common on mobile devices, like Flash Uses text that is readable without zooming Sizes content to the screen so users don't have to scroll horizontally or zoom Places links far enough apart so that the correct one can be easily tapped Encryption Protects web application with HTTPS, even if it doesn t handle sensitive communications 9. Public Facing Web Application The following standards only apply to web applications or websites that are public facing. Last Update: March 2, 2017 Page 4 of 9
5 Visual Identity, Colors and Fonts Must be able to follow the CoE Visual Identity Standards. Google Analytics Must be able to embed the Google Analytics to track the visiting traffic details. Section B - Standards that Apply to City Hosted Solutions These standards apply where the services or servers are to be located at a City of Edmonton datacenter. 1. Computing Facilities General Rack Sizes The City of Edmonton maintains three primary computing facilities. All solutions that are hosted by the City should be capable of being hosted from one of these three facilities and must conform to IEEE standards. All equipment that is to be hosted at a City of Edmonton computing facility must use a standard 19-inch rack size. 2. Networks Internal Network Internal wired network connections exist at all city facilities. Any product, device, or application requiring network access, or sending/receiving data across the city s network that does not meet CoE Server, operating system, hardware or software standards requires prior approval on a case by case basis. Remote Access Vendor remote access is offered by the City of Edmonton, if required. 3. Data Storage & Backup Data Storage The City of Edmonton maintains a fibre-channel data storage-area network, that is available to all solutions hosted at the City of Edmonton computing facilities. Mirroring between systems is available, if required, to enable higher availability of systems. Backups All corporate information is subject to regular backups. Backups also include off-site storage as part of the City of Edmonton s Disaster Recovery plans. 4. Telecommunications Last Update: March 2, 2017 Page 5 of 9
6 General Telecommunications services to the city s 400+ sites are provided through a combination of Centrex digital, analog telephone services and Voice over IP services. Any telecommunications device or application must utilize existing telecommunications infrastructure. The use of analog telephone services requires approval by the City of Edmonton. Voic Voic is provided by a combination of City owned systems devices and service contracts with providers. 5. Server Operating Systems There are two supported operating systems. Both operating systems are available to each class of server (see below). Windows Server 2012 R2 UNIX Specific Versioning is available upon request if appropriate Database Servers The UNIX operating system is the preferred environment for solutions that require high-availability. Virtualization The City of Edmonton uses virtualization technology within its server infrastructure. The use of virtual servers is strongly preferred for all Windows solutions. Higher requirements should utilize standalone physical server(s) with preference to blades, then rack mounted.. *1-4 vcpu to max of 12 vcpu 8-16 gigs RAM to a max of 64 gigs RAM 1 v NIC Network connection 100 GB of storage disk - includes 40 gb required for C: OS (extra charge required for more disk) Licensing Remote Access Antivirus Domain Environment Software licensing models must indicate what premium, if any, is charged for multicore processor configurations. The license models must also indicate how virtual environments impacts the costs and terms of the license. No remote access solutions may be installed directly on servers. Only the existing remote access solutions maintained, and approved, by the Information Technology Branch Network Operations Team may be used. All server installations include anti-virus services. The current version of Domain Controllers for Active Directory is Windows Server 2012 R2. Last Update: March 2, 2017 Page 6 of 9
7 Windows AD Test Environment A test domain is available which closely simulates the production environment. 6. Database Enterprise Environments The City of Edmonton supports two enterprise class database environments: Oracle - 12c. Microsoft SQL Server The use of other enterprise level database environments must be justified on an exception basis. Database Development The City of Edmonton provides limited development support for local and middle tier database applications. Technical support at this level is limited to the provisioning of the database platforms and does not extend to the support of end-user applications developed using these database solutions. Limited "best-effort" application support may be available in certain circumstances. Database Architecture The City of Edmonton supports the the sound Database Architecture principles, including the normalization of logical data to physical database Data Lifecycle The City of Edmonton requires the ability to manage application lifespan with archive and purge options. 7. Desktop Computing Devices Operating Systems There are two supported standard operating systems. Not all operating systems are available on all classes of devices. Windows bit Chrome OS Alternative platforms may be available as exceptions. Desktop Desktop computers run either supported operating system, as appropriate to their hardware. Last Update: March 2, 2017 Page 7 of 9
8 Laptops Laptop computers run either supported operating system, as appropriate to their hardware. Tablets Tablet computing devices are primarily ipad devices. 1. Internal Authentication General Active Directory is the authoritative source for all authentications within the City of Edmonton network, including employees and external affiliates. Single Sign-On It is desired that Internally hosted solutions have the capability to integrate with authentication services. Integration It is desired that internally hosted solutions be capable of integrating with Active Directory for the purpose of account provisioning and deprovisioning. On-demand integration with Active Directory, such as for authentication, should not be performed except through a City of Edmonton approved authentication source. Section C - Standards that Apply to Externally Hosted Solutions These standards apply where the services or servers are to be located at a location managed by a service provider. 1. External Authentication General All external solutions must provide application security, including role-based access control. Account IDs and passwords must be capable of being at minimum 10 character each. Single Sign-On It is desired that externally hosted solutions have the capability to integrate with authentication services. They should rely on existing standard authentication processes, such as SAML or OAUTH. Integration It is desired that externally hosted solutions be capable of integrating with Active Directory for the purpose of account provisioning and deprovisioning. On-demand integration with Active Directory, such as for authentication, should not be performed except through a City of Edmonton approved authentication source. 2. Business Continuity Last Update: March 2, 2017 Page 8 of 9
9 Disaster Recovery Plans All City of Edmonton solutions are required, as part of the Business Impact Assessment, to define Recovery Point Objectives and Recovery Time Objectives. Backups All data backups must be encrypted. All data backups must be either stored offsite or replicated to an alternate site. 3. Application Design & Configuration Design All applications must include an Entity Relationship Diagram. Configuration The application should allow customization and / or configuration to maintain City of Edmonton communications design guidelines regarding the visual look and feel of the application. The proponent of the application should describe how the application could be moved to a different platform or functionality transitioned to another application. 4. Integration Web Services The preferred method for accessing City data is web-services that use industry-standard protocols and message formats. The functionality of the application should be consumable via web services to enable as real-time integration, or as near to real-time as is reasonable. Data The City s data must be available to other City of Edmonton applications including business intelligence and statistical reporting tools. Unstructured data should reside in a content repository versus the application s database. Last Update: March 2, 2017 Page 9 of 9
NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationWHITE PAPER- Managed Services Security Practices
WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationSection A - Standards that Apply to All CoE Owned Devices
These standards provide general information regarding the devices provided and supported by the Information Technology branch. These standards are published, at minimum, bi-annually through consultation
More informationBlueprinting Questionnaire Sample
Manish Chaitanya Blueprinting Questionnaire Sample from The Complete Guide to SAP NetWeaver Portal Bonn Boston ch11_a_online_6124.indd 1 1/12/12 2:58:16 PM A Blueprinting Questionnaire Sample In Chapter
More informationMYOB ENTERPRISE SOLUTIONS. System Requirement Guidelines EXO BUSINESS. Version 2.9 Thursday 1 st May 2014 MYOB ENT ER P R IS E S OLUT IONS
MYOB ENTERPRISE SOLUTIONS System Requirement Guidelines Version 2.9 Thursday 1 st May 2014 EXO BUSINESS MYOB ENT ER P R IS E S OLUT IONS Contents Important Please Read Carefully... 3 Quick Links... 3 System
More informationREQUEST FOR INFORMATION. Records Management. in SharePoint
REQUEST FOR INFORMATION For Washington County, Minnesota Records Management in SharePoint February 22, 2018 TABLE OF CONTENTS INTRODUCTION & BACKGROUND... 3 1. Introduction... 3 2. County Information...
More informationTable of Contents. Page 1 of 6 (Last updated 27 April 2017)
Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational
More informationDooblo SurveyToGo: Security Overview
Dooblo SurveyToGo: Security Overview November, 2013 Written by: Dooblo Page 1 of 11 1 Table of Contents 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 PURPOSE... 3 2 PHYSICAL DATA CENTER SECURITY... 4 2.1 OVERVIEW...
More informationAcademic Price Sheet Respondent:
Sheet Respondent: INSTRUCTIONS Product and Service List Worksheet Instructions Respondents MUST complete the entire row for either Government, or both. Any software listed for which there is not a corresponding
More informationCode Alert Customer Information Technology Requirements Series 30 Software
Code Alert Customer Information Technology Requirements Series 30 Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may
More informationFY18 ITS Service Rates
Updated by Richard Hu Updated on 4/25/17 FY18 ITS Service Rates Desktops, Laptops, Mobile & Other Devices Standard Devices FY18 Rate New Connection, Replacement, Reconnect, FY17 Rate Relocation Standard
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationMYOB Enterprise Solutions
Enterprise Solutions System Requirement Guidelines Last Updated: 16 May 2017 Contents Important Please Read Carefully 4 Quick Links 4 System Requirements 5 Overview... 5 Server Requirements... 6 Server
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More information2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.
Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third
More informationSage 300 People & Web Self Service Technical Information & System Requirements
Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People Architecture The Sage 300 People application is a 2-tier application with the program and database residing
More informationSafe Place and Code Alert Customer Information Technology Requirements Series 10.x Software
Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part
More informationServices Catalouge.
Services Catalouge www.interactts.com Consulting & Professional Services Consulting & Professional Services Active Directory Implementation & Migration Microsoft Exchange Server Data Center Assessments
More informationQUESTIONS AND CONTACTS
Contact: Jake Losinski, Management Analyst P.O. Box 2315 480 East Avenue North Ketchum, ID 83340 July 27, 2018 Telephone: (208) 727-5081 jlosinski@ketchumidaho.org SUBMITTAL DEADLINE The City of Ketchum,
More informationInformation Security Policy
Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated
More informationInfrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT
Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Contents 1 Cloud+ IaaS Pricing...2 1.1 Service Pricing Guide... Error! Bookmark not defined. 1.2 Cloud+ Networking Pricing...
More informationMB Microsoft Dynamics CRM 2016 Online Deployment.
MB2-710 Microsoft Dynamics CRM 2016 Online Deployment Getting Started Overview CRM Online is a cloud-based offering of Microsoft Dynamics CRM The licensing is a subscription-based model with a monthly
More informationData Security and Privacy Principles IBM Cloud Services
Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer
More informationVMware View Upgrade Guide
View 4.0 View Manager 4.0 View Composer 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationTechnical Brief SUPPORTPOINT TECHNICAL BRIEF MARCH
Technical Brief 1 SupportPoint Cloud is a SaaS solution that makes it easy for people to get the information and guidance they need to navigate through complex business processes. SupportPoint Cloud Client
More informationSYSTEM REQUIREMENTS M.APP ENTERPRISE
SYSTEM REQUIREMENTS M.APP ENTERPRISE Description or Document Category October 06, 2016 Contents M.App Enterprise Server... 3 Hardware requirements... 3 Disk space requirements... 3 Production environment
More informationSAP HANA Operation Expert Summit BUILD User Management & Security Overview Andrea Kristen/SAP HANA Product Management May 2014.
SAP HANA Operation Expert Summit BUILD User Management & Security Overview Andrea Kristen/SAP HANA Product Management May 2014 Customer Disclaimer This presentation outlines our general product direction
More informationSupport for the HIPAA Security Rule
white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe
More informationQvidian Proposal Automation System Requirements
Qvidian Proposal Automation System Requirements Version 11.0.6-10/13/2017 Copyright Copyright 2017 Qvidian. All rights reserved. Information in this document is subject to change without notice. The software
More informationSECTION SPECIAL SYSTEMS. Website and Construction Cameras
PART 1 GENERAL SECTION 01121 SPECIAL SYSTEMS 1.01 WORK INCLUDED A. Project Construction Site Cameras and Video Streaming Servers B. Project Web site C. Network & Infrastructure D. Internet Connectivity
More informationMyCloud Computing Business computing in the cloud, ready to go in minutes
MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing
More informationMeltem Özturan misprivate.boun.edu.tr/ozturan/mis515
Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility
More informationInformation Security BYOD Procedure
Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,
More informationApril Appendix 3. IA System Security. Sida 1 (8)
IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA
More information1) Are employees required to sign an Acceptable Use Policy (AUP)?
Business ebanking Risk Assessment & Controls Evaluation As a business owner, you want to be sure you have a strong process in place for monitoring and managing who has access to your Business ebanking
More informationFY19 ITS Service Rates
ITS Service Rates Standard Devices Rate Standard Devices New Connection, Replacement, Reconnect, Relocation FY18 Rate Standard Locked Desktop/Laptop $400 per year $100 one-time fee * $395 per year 1.27%
More informationCloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.
Cloud Computing An introduction using MS Office 365, Google, Amazon, & Dropbox. THIS COURSE Will introduce the benefits and limitations of adopting cloud computing for your business. Will introduce and
More informationIT Managed Services. Schedule 1 Specification 11/07/18
` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...
More informationBRING YOUR OWN DEVICE POLICY
BRING YOUR OWN DEVICE POLICY Updated Term 2 Review 2019 17 Quorn Area School BYOD POLICY [Review of policy in 2019] Quorn Area School is committed to aiding students and staff in creating a 21st Century
More informationRecords Information Management
Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom
More informationRFP # QUESTIONS AND ANSWERS Posted: February 5, 2016
RFP # 2016-02 QUESTIONS AND ANSWERS Posted: February 5, 2016 REQUEST FOR PROPOSAL RFP # 2016-02 Q: Who currently manages your IT services today? A: Inspired Technologies. Q: Are you satisfied with their
More informationTECHNICAL WHITE PAPER AUGUST 2017 REVIEWER S GUIDE FOR VIEW IN VMWARE HORIZON 7: INSTALLATION AND CONFIGURATION. VMware Horizon 7 version 7.
TECHNICAL WHITE PAPER AUGUST 2017 REVIEWER S GUIDE FOR VIEW IN VMWARE HORIZON 7: INSTALLATION AND CONFIGURATION VMware Horizon 7 version 7.x Table of Contents Introduction.... 3 JMP Next-Generation Desktop
More informationSecurity. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved.
Security Bob Shantz Director of Infrastructure & Cloud Services 2016 Computer Guidance Corporation. All Rights Reserved. CPE Credits To receive your CPE Credits:. Complete a survey for each session attended.
More informationHOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE
HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HIFIS Development Team May 16, 2014 Contents INTRODUCTION... 2 HIFIS 4 SYSTEM DESIGN... 3
More informationEnterprise Architecture Technology Standards
Platform Technical Requirements May 29, 2018 Enterprise Architecture Technology Standards Our Vision We will become the nation's model for delivery of technology, media, and contact center services for
More informationGovernment Price Sheet Respondent:
Sheet Respondent: INSTRUCTIONS Product and Service List Worksheet Instructions Respondents MUST complete the entire row for either, Academic or both. Any software listed for which there is not a corresponding
More informationData Security at Smart Assessor
Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5
More informationCUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: April 6, 2018
CUNY Graduate Center Information Technology IT for & Effective Date: April 6, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video
More informationUNCLASSIFIED. Mimecast UK Archiving Service Description
UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly
More informationAccelerated Technology Refresh Project (ATRP) at VCH and PHC. Frequently Asked Questions
Accelerated Technology Refresh Project (ATRP) at VCH and PHC Frequently Asked Questions About the Desktop Transformation Program What is the Accelerated Technology Refresh Project? What are the costs to
More informationUnifia Environment UE
Unifia Environment UE IT Specifications 2018 OLYMPUS CORPORATION OF THE AMERICAS PAGE 1 OF 8 TR0091V07 Unifia Environment UE IT Specifications UE SERVER MINIMUM SPECIFICATIONS Operating System: Microsoft
More informationInformation Technology Disaster Recovery Planning Audit Redacted Public Report
1200, Scotia Place, Tower 1 10060 Jasper Avenue Edmonton, Alberta T5J 3R8 edmonton.ca/auditor Information Technology Disaster Recovery Planning Audit Redacted Public Report June 12, 2018 City of Edmonton
More informationVirtual Appliance User s Guide
Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationIntroduction. Architecture Overview
Performance and Sizing Guide Version 17 November 2017 Contents Introduction... 5 Architecture Overview... 5 Performance and Scalability Considerations... 6 Vertical Scaling... 7 JVM Heap Sizes... 7 Hardware
More informationSUGGESTED SOLUTION IPCC MAY 2017EXAM. Test Code - I M J
SUGGESTED SOLUTION IPCC MAY 2017EXAM INFORMATION TECHNOLOGY Test Code - I M J 7 1 2 1 BRANCH - (MULTIPLE) (Date : 20.11.2016) Head Office : Shraddha, 3 rd Floor, Near Chinai College, Andheri (E), Mumbai
More informationPerceptive Process Mining
Perceptive Process Mining Technical s Version: 2.13.x Written by: Product Knowledge, R&D Date: March 2018 2015-2018 Hyland Software, Inc. and its affiliates. Table of Contents About the technical specifications...
More informationSecurity Architecture
Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to
More informationAltius IT Policy Collection
Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software
More informationFIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION
FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and
More informationUnifia Environment UE
Unifia Environment UE IT Specifications 2017 OLYMPUS CORPORATION OF THE AMERICAS PAGE 1 OF 6 TR0091V06 Unifia Environment UE IT Specifications UE SERVER MINIMUM SPECIFICATIONS Operating System: Microsoft
More informationAcademic Price Sheet Respondent:
Sheet Respondent: INSTRUCTIONS Product and Service List Worksheet Instructions Respondents MUST complete the entire row for either Government, or both. Any software listed for which there is not a corresponding
More informationIntroduction to SURE
Introduction to SURE Contents 1. Introduction... 3 2. What is SURE?... 4 3. Aim and objectives of SURE... 4 4. Overview of the facility... 4 5. SURE operations and design... 5 5.1 Logging on and authentication...
More informationMorningstar ByAllAccounts Service Security & Privacy Overview
Morningstar ByAllAccounts Service Security & Privacy Overview Version 3.8 April 2018 April 2018, Morningstar. All Rights Reserved. 10 State Street, Woburn, MA 01801-6820 USA Tel: +1.781.376.0801 Fax: +1.781.376.8040
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationIBM SmartCloud Notes Security
IBM Software White Paper September 2014 IBM SmartCloud Notes Security 2 IBM SmartCloud Notes Security Contents 3 Introduction 3 Service Access 4 People, Processes, and Compliance 5 Service Security IBM
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationPhire 12.2 Hardware and Software Requirements
Phire 12.2 Hardware and Software Requirements Copyright 2017, Phire. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information; they are provided
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationIntegrated Cloud Environment Security White Paper
Integrated Cloud Environment Security White Paper 2012-2016 Ricoh Americas Corporation R i c o h A m e r i c a s C o r p o r a t i o n R i c o h A m e r i c a s C o r p o r a t i o n It is the reader's
More informationGetting Started with Commercial Services
Getting Started with Commercial Services USER GUIDE For informational purposes only, not considered an advertisement. WELCOME TO M&T BANK S COMMERCIAL SERVICES M&T Bank s Commercial Services system provides
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationSecurity and Compliance at Mavenlink
Security and Compliance at Mavenlink Table of Contents Introduction....3 Application Security....4....4....5 Infrastructure Security....8....8....8....9 Data Security.... 10....10....10 Infrastructure
More informationChecklist: Credit Union Information Security and Privacy Policies
Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationDeploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform
Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,
More informationSage 200c Professional. System Requirements and Prerequisites
Sage 200c Professional System Requirements and Prerequisites Copyright statement Sage (UK) Limited, 2017. All rights reserved. If this documentation includes advice or information relating to any matter
More informationSage 200c Professional. System Requirements and Prerequisites
Sage 200c Professional System Requirements and Prerequisites Copyright statement Sage (UK) Limited, 2017. All rights reserved. If this documentation includes advice or information relating to any matter
More informationP a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection
P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationAtmosphere Fax Network Architecture Whitepaper
Atmosphere Fax Network Architecture Whitepaper Contents Introduction... 3 The 99.99% Uptime Fax Network... 4 Reliability and High Availability... 5 Security... 7 Delivery... 9 Network Monitoring... 11
More informationMYOB Enterprise Solutions System Requirement Guidelines. Wednesday 21 st March 2012 Version 2.6
Wednesday 21 st March 2012 Version 2.6 Contents 1 SYSTEM REQUIREMENTS... 4 1.1 OVERVIEW... 4 1.2 SERVER REQUIREMENTS... 4 1.2.1 SERVER REQUIREMENTS (EXCLUDING TERMINAL SERVER)... 4 1.2.2 WINDOWS TERMINAL
More informationHosted Desktop Features & Benefits. Technology House, 59 Washway Road, Sale, Manchester, M33 7AB Support
Hosted Desktop Features & Benefits Contents 3: Features 4: Data & Storage 5: Data Centres 6: Security 7: Support 8/9: FAQs Features Windows 10 Desktop 30GB Storage Office 2016/2019 Hosted Exchange 2016/2019
More informationCODE ALERT Enterprise Software Customer Information Technology Requirements
CODE ALERT Enterprise Software Customer Information Technology Requirements 2018 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may
More informationAMP CREATIVES is a digital creative agency empowering small business growth via
AMP CREATIVES is a digital creative agency empowering small business growth via identity through design. We believe that attention to craft, quality, and character embed life and beauty into every partnership
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationVMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationGeneral Recommendations
General Recommendations The following recommendations are not required for a successful implementation of PowerSchool, but are strongly recommended for reasons pertaining to data security, redundancy,
More informationSage 200c Professional. System Requirements and Prerequisites
Sage 200c Professional System Requirements and Prerequisites Copyright statement Sage (UK) Limited, 2018. All rights reserved. If this documentation includes advice or information relating to any matter
More informationVMware App Volumes Installation Guide. VMware App Volumes 2.13
VMware App Volumes Installation Guide VMware App Volumes 2.13 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this
More informationPHILADELPHIA GAS WORKS
Q1 Q2 Q3 Q4 QUESTIONS Regarding section 2.2.1 Hosting Services. The last bullet on page 6 states Primary Data center facility to be located in Philadelphia. Does this just confirm that PGW already has
More informationNetwork Performance, Security and Reliability Assessment
Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD
More informationService Catalog. Infrastructure and Compute. Virtual Machines. Cirrus Compute. Test/Dev. Private Cloud. WebLogic Database. Platform Jboss IIS
Cirrus Offerings Service Catalog Infrastructure and Compute Test/Dev Virtual Machines Cirrus Compute Private Cloud Platform Jboss IIS WebLogic Database Storage Business Continuity and Availability File
More informationAtoS IT Solutions and Services. Microsoft Solutions Summit 2012
Microsoft Solutions Summit 2012 1 Building Private Cloud with Microsoft Solution 2 Building Private Cloud with Microsoft Solution Atos integration Establish a new strategic IT partnership From July 2011
More informationACM Retreat - Today s Topics:
ACM Retreat - Today s Topics: Phase II Cyber Risk Management Services - What s next? Policy Development External Vulnerability Assessment Phishing Assessment Security Awareness Notification Third Party
More informationPrice list for Microsoft Office 365 from Swisscom. Valid from 1 may, 2016
Price list for Microsoft Office 365 from Swisscom Valid from 1 may, 2016 2 Overview General part 3 Plans Business (1 300 users) 4 > Office 365 Business > Office 365 Business Essentials > Office 365 Business
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More information